LeChiffre Ransomware Hits Three Indian Banks, Causes Millions in Damages

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Forum Veteran
Jan 24, 2011
9,380
1
24,873
8,379
malwaretips.com
lechiffre-ransomware-hits-three-indian-banks-causes-millions-in-damages-499350-2.png


An unknown hacker has breached the computer systems of three banks and a pharmaceutical company and infected most of their computers with crypto-ransomware.

The incident took place at the start of January, all companies were located in India, and the hacker(s) used the LeChiffre ransomware family to encrypt files on the infected computers.

LeChiffre is a hand-cranked ransomware
LeChiffre is not your typical ransomware and works only if launched into execution manually. The hacker managed to infiltrate the networks of all companies, and then escalated his access to other computers via unprotected Remote Desktop ports.

Once he gained access to a computer, the hacker would download the ransomware from his server and then double-click it to start the encryption process.

According to Malwarebytes, a cyber-security vendor who took a closer look at how the ransomware works, LeChiffre's encryption operates by encrypting the first and last 8192 bytes of each file and then appending the encryption key to the file as a 32-byte blob. The encryption is AES.

Malwarebytes also says the ransomware is written in Delphi, and that its interface is in Russian.

"LeChiffre looks very unprofessional [...] practically, no countermeasures against analysis has been taken," says Hasherezade, security analyst for Malwarebytes.

"It can be justified by the fact, that this ransomware was not intended to be distributed in [a] campaign, only used by attackers after they entered the system," the analyst also added. "However, poorly implemented encryption and model of communication with victims (via e-mail), shows that this malware has been prepared lazily, probably by beginners."

Read more: LeChiffre Ransomware Hits Three Indian Banks, Causes Millions in Damages
 
It is ludicrous how IT security professionals criticize malware for being amateurish, unprofessional, poorly implemented, etc.

All that matters is that the hack and malware worked.
Indeed!
I'm sure the same thing cannot be said about something so advanced as Stuxnet!!
A "masterpiece" in malware design!!Then again, it was funded by a nation state!;)
 
That was long due ,I am wondering why did it take so long as wife of one of my colleague works in one of the largest indian bank and that bank does not have even windows defender and all the staff there is so cyber expert that you can not imagine of,I hope you under stand what I mean
 
LeChiffre Ransomware Decrypter Available, Users Can Get Files Back for Free

LeChiffre Ransomware Decrypter Available, Users Can Get Files Back for Free

The LeChiffre ransomware which infected the computers of three Indian banks and a pharmaceutical company causing millions in damages, has been cracked and a decrypter is now available.

Guilty as always is Emsisoft's Fabian Wosar, who took a closer look at the LeChiffre code after security researchers from Malwarebytes published an initial analysis last Friday.

As Malwarebytes correctly assumed over the weekend, this ransomware family was the work of beginners, and Mr. Wosar, secretly nicknamed "the scourge of all ransomware authors," managed to crack it in under a day.
 
It is ludicrous how IT security professionals criticize malware for being amateurish, unprofessional, poorly implemented, etc.

All that matters is that the hack and malware worked.

Very well said, imagine if it were very well written etc. Then they'd have a bloody hard time trying to get their heads around it :P
 
I should agree on mentioned about the stereotype of the designing of malware however they should understand the damage it may done. The money spend for repair and time due to disruption.

More value are been wasted when encounter those tough ransomware.